☆137Jan 8, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2023-28229
Users that are interested in CVE-2023-28229 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆61Aug 21, 2023Updated 2 years ago
- ☆67Oct 10, 2023Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Aug 25, 2023Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆135Jul 11, 2023Updated 2 years ago
- ☆240Aug 23, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Mar 13, 2024Updated 2 years ago
- SolarView Compact through 6.00 downloader.php commands injection (RCE) nuclei-templates☆15Jun 16, 2023Updated 2 years ago
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- ☆114Aug 25, 2023Updated 2 years ago
- ☆246Sep 19, 2023Updated 2 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- RCE exploit for CVE-2023-3519☆229Aug 23, 2023Updated 2 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆906Mar 19, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- ☆323Jan 13, 2023Updated 3 years ago
- LPE exploit for CVE-2023-21768☆506Jul 10, 2023Updated 2 years ago
- ☆162Jun 18, 2023Updated 2 years ago
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆236Sep 26, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆564Feb 22, 2024Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆506Aug 10, 2023Updated 2 years ago
- lazy way to create CVE-2023-38831 winrar file for testing☆94Aug 24, 2023Updated 2 years ago
- ☆22Jan 15, 2025Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆464Sep 24, 2023Updated 2 years ago
- ☆334Jun 4, 2024Updated last year
- ☆42Jun 23, 2024Updated last year
- Analysis of the vulnerability☆50Jan 23, 2024Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆362Dec 19, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- ☆82Apr 9, 2024Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆293Jul 15, 2023Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆373May 16, 2023Updated 2 years ago
- A Windows potato to privesc☆391Aug 26, 2024Updated last year
- ☆58Jan 29, 2024Updated 2 years ago
- Protected Process Dumper Tool☆586Aug 30, 2023Updated 2 years ago